Bugtraq mailing list archives
Re: easy DoS in most RPC apps
From: trost () CLOUD RAIN COM (Bill Trost)
Date: Wed, 13 May 1998 16:46:22 -0700
Peter van Dijk writes: Update: I tested the same trick on two NeXT Mach's. The portmapper is vulnerable there, as are possibly other services. NFS is not (not directly, a non-working portmapper does have it's effect) because it only uses UDP. NFS might have problems on a server that also supports NFS over TCP. FreeBSD-current seems to have the problem, too (tested against both amd and portmapper). The amd one is sort of amusing, as it means that accesses via it will *hang* so long as the attack is in progress. I also tried it against the portmapper on SunOS 4.1.3, with similar results. I also wonder what the effect of this attack could be if combined with T/TCP and multicast.... I have reported the bug to the FreeBSD folks. > On Sat, 28 Mar 1998, Peter van Dijk wrote: > > If you connect (using telnet, netcat, anything) to a TCP port assigned to > > some RPC protocol (tested with rpc.nfsd/mountd/portmap on Slackware > > 3.4/Kernel 2.0.33) and send some 'garbage' (like a newline ;) every 5 > > seconds or faster, the service will completely stop responding.
Current thread:
- Re: easy DoS in most RPC apps Peter van Dijk (May 10)
- Re: easy DoS in most RPC apps Peter van Dijk (May 12)
- Re: easy DoS in most RPC apps Bill Trost (May 13)
- <Possible follow-ups>
- Re: easy DoS in most RPC apps Peter van Dijk (May 14)
- Re: easy DoS in most RPC apps David LeBlanc (May 17)
- Re: easy DoS in most RPC apps Scott Stone (May 17)
- Re: easy DoS in most RPC apps Bill Paul (May 17)
- Re: easy DoS in most RPC apps Olaf Kirch (May 18)
- simple kde exploit fix David Zhao (May 17)
- Re: simple kde exploit fix Luca Berra (May 18)
- NFS shell Leendert van Doorn (May 18)
- Re: NFS shell Oliver Friedrichs (May 19)
- Re: NFS shell Leendert van Doorn (May 19)
- Re: easy DoS in most RPC apps Scott Stone (May 17)
- Re: easy DoS in most RPC apps Peter van Dijk (May 12)